CN107707530A - A kind of method for secret protection and system of mobile intelligent perception - Google Patents

A kind of method for secret protection and system of mobile intelligent perception Download PDF

Info

Publication number
CN107707530A
CN107707530A CN201710814904.1A CN201710814904A CN107707530A CN 107707530 A CN107707530 A CN 107707530A CN 201710814904 A CN201710814904 A CN 201710814904A CN 107707530 A CN107707530 A CN 107707530A
Authority
CN
China
Prior art keywords
perception
data
module
modulator
perception data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710814904.1A
Other languages
Chinese (zh)
Other versions
CN107707530B (en
Inventor
熊金波
马蓉
金彪
林铭炜
姚志强
张媛媛
王丽丽
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Fujian Normal University
Original Assignee
Fujian Normal University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fujian Normal University filed Critical Fujian Normal University
Priority to CN201710814904.1A priority Critical patent/CN107707530B/en
Publication of CN107707530A publication Critical patent/CN107707530A/en
Application granted granted Critical
Publication of CN107707530B publication Critical patent/CN107707530B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/383Anonymous user system
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • G06Q30/0601Electronic shopping [e-shopping]
    • G06Q30/0613Third-party assisted
    • G06Q30/0615Anonymizing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds

Abstract

The present invention relates to a kind of method for secret protection and system of mobile intelligent perception; this method includes perception data upload, perception data polymerization and perception data transactional stage; the system includes mixed excitation sensing module, perception data adds module of making an uproar, user key generation module, perception data encrypting module, encryption data uploading module, perception data aggregation module, perception data deciphering module, multi-party computations module and perception data transaction auction module, the present invention establish effective mechanism and perceive the participation of user and the authenticity of perception data to improve;And perception individual subscriber private data can be effectively protected to exempt from leakage; the problems such as false data of preventing malice user, it is relatively low that it is related to algorithm computing cost, has reached safe and efficient design object; use, can be applied in actual production life process suitable for large-scale promotion.

Description

A kind of method for secret protection and system of mobile intelligent perception
Technical field
The present invention relates to community to perceive field, more particularly to a kind of method for secret protection and system of mobile intelligent perception.
Background technology
The thought of mass-rent is combined by mobile gunz sensory perceptual system with mobile awareness, by the mobile device of domestic consumer its Embedded type sensor contained by body(Such as acceleration sensor, digital compass, GPS, microphone, shooting it is first-class)As powerful sense Know unit, conscious or unconscious cooperation is carried out by mobile Internet, forms intelligent perception network, realizes perception task point Hair is collected with perception data, completes large-scale, complicated social perception task.It perceives mould as a kind of brand-new Internet of Things Formula provides a kind of new way and means to realize that ubiquitous depth society perceives, but is limited to perceive participant's lazy weight Not high with the offer quality of data, the development of intelligent perception receives serious influence.
During data perception, perceiving user needs to consume such as device battery electricity, computing resource and data traffic Resource.There is no appropriate return, participant is not interested to be participated in perceiving.What is more important in mobile gunz sensing network, The perception data of collection contains a large amount of personal sensitive and privacy informations, faces great private data leakage risk.In addition, modulation Therefore device can cause intermediary to be obtained with perceiving user with many malice transaction issues be present in service provider's process of exchange Prospective earnings, or even interests loss.
In order to solve to move the privacy leakage in intelligent perception, most of secret protection schemes are complete to assume intermediary It is credible, perceive user and secret protection measure is taken in perception task, each user is provided truly in certain perception task Perception data, one data level of anonymity of simultaneous selection.Data anonymous is available True Data is added noise,k-anonymity Etc. mode.But the intelligent perception under the incomplete trustworthy information of intermediary is not accounted for, and perceives secret protection used by user Security threat be present in method(Such as k anonymities can not resist background knowledge attack), also lack malicious user is acted in collusion it is hidden Private Protective strategy.
In order to solve to move the transaction of the malice in intelligent perception, being introduced into repeated game in game theory prevents the hair of prisoner It is raw, but still suffer from the problems such as more service provider's competitions are with service provider's secret protection.
In summary, for privacy leakage and malice transaction issues present in mobile intelligent perception, existing solution party Case from considering simply solve a certain problem in a certain respect, seriously ignores other challenges, it is impossible to comprehensive to solve mobile gunz sense Perception data secret protection and perception data transaction issues in knowing.Therefore, it is necessary to which above-mentioned peace can be solved simultaneously by inventing one kind The method and corresponding system of full problem.
The content of the invention
In view of this, it is an object of the invention to provide a kind of method for secret protection and system of mobile intelligent perception, energy Enough effectively protections perceive individual subscriber private data.
To achieve the above object, the present invention adopts the following technical scheme that:
A kind of method for secret protection of mobile intelligent perception, including:
Perception data is uploaded, perception data polymerization and perception data are merchandised;
The perception data, which uploads, to be comprised the following steps:
Step S11:Perceive user and perception task is participated in by the embedded type sensor of mobile device, obtain perception data;
Step S12:It is distributed plus is made an uproar using distributed geometry and perception data is carried out to add processing of making an uproar;
Step S13:According to key constraint condition, mobile gunz sensory perceptual system generation perceives the encryption key and modulator of user Decruption key;
Step S14:Encryption key is sent to the perception user for participating in perception task by safe lane, decruption key is passed through Safe lane is sent to modulator;
Step S15:Perceive user obtain encryption key, pair plus make an uproar processing after perception data be encrypted, obtain ciphertext And ciphertext is uploaded to modulator;
The perception data polymerization comprises the following steps:
Step S21:Modulator obtains whole ciphertexts that the perception user of all participation perception tasks is uploaded;
Step S22:The progress quadrature computing of gained whole ciphertext is obtained the perception user institute of all participation perception tasks by modulator Upload the product of ciphertext;
Step S23:Processing is decrypted to the obtained products of step S22 with decruption key and obtains the polymerization of perception data for modulator As a result and it is stored in modulator;
The perception data transaction comprises the following steps:
Step S31:Type by the polymerization result of the perception data obtained by step S23 is published to mobile gunz sense by modulator Know all service providers in system;
Step S32:Service provider decides whether to participate in this data trade mistake according to the type of the polymerization result of perception data Journey, if service provider determines to participate in data trade, carry out step S33;Otherwise, transaction is exited;
Step S33:Modulator record participates in service provider's number of current data transaction auctionnAnd clap participating in data trade The service provider sold from 1 tonIt is numbered;
Step S34:Modulator produces a random number X by random sequence generator, and provides to the pre- of current transaction data If price P;
Step S35:Modulator sums random number X and default price P, and result X+P is transferred into numbering by safe lane For 1 service provider;
Step S36:The service provider that numbering is 1 sums obtained result X+P and oneself quotation P1 to transaction data, and Result X+P+P1 is sent to the service provider that numbering is 2, the like, until numbering isnService provider will be final As a result Y is back to modulator, Y=X+P+P1+...+Pn, and Pn is that numbering isnQuotation of the service provider to transaction data;
Step S37:Modulator calculates price p=(the Y-X)/n that starts auction, and the price that will start auction is published to and participates in current data transaction bat The service provider sold;
Step S38:Service provider each offers according to the price adjustment that starts auction and is sent to modulator;
Step S39:Modulator selects the winning bidder that soprano auctions for data trade that offers in the quotation of service provider;
Step S40:The winning bidder of data trade auction pays the corresponding amount of money according to the quotation of oneself to modulator;
Step S41:Modulator sends the polymerization result of perception data to the winning bidder of data trade auction, completes transaction.
Further, the distribution of distributed geometry plus make an uproar in the step S12 and meet difference privacy, be a kind of drawing of discrete type Pula this noise addition mechanism, can reduce influences because noise adds on the error caused by the polymerization result of perception data.
Further, encryption uses homomorphic cryptography mode in the step S15.
Further, decryption processes are in the step S23:Ciphertext tire out and multiplies calculating, is not required to each close Text is decrypted, that is, obtains all plaintext sums.
A kind of intimacy protection system of mobile intelligent perception, including mixed excitation sensing module, perception data add module of making an uproar, User key generation module, perception data encrypting module, encryption data uploading module, perception data aggregation module, perception data Deciphering module, multi-party computations module and perception data transaction auction module;
The mixed excitation sensing module, for encouraging more perception users persistently to participate in perception task and providing perception data;
The perception data adds module of making an uproar, for adding noise to perception data using the distribution of distributed geometry;
The user key generation module, user encryption key and modulator decryption are perceived for being generated according to key constraint condition Key;
The perception data encrypting module, for perception data being encrypted operation;Using perception user encryption key to sense Primary data is encrypted to obtain ciphertext;
The encryption data uploading module, the ciphertext for perception data encrypting module to be obtained are uploaded to modulator;
The perception data aggregation module, ciphertext obtained by encryption data uploading module is polymerize for modulator;
The perception data deciphering module, for polymerization result obtained by perception data aggregation module to be decrypted;
The multi-party computations module, the service provider for participating in data auction do not reveal in guarantee itself quotation privacy On the premise of, joint consultation goes out transaction data and started auction price;
The perception data transaction auction module, for selecting winning bidder according to the quotation of service provider, carries out data trade.
Further, in the user key generation module, perceive user encryption key and modulator decruption key by with Pair machine key schedule randomly generates on the premise of its key constraint condition is met, and completes a perception task, i.e., The perception data at certain moment fails after operation is encrypted and decrypted.
The present invention has the advantages that compared with prior art:The present invention is effectively prevented from perceiving individual subscriber privacy Leaking data, the problems such as the false data of preventing malice user.It is relatively low that it is related to algorithm computing cost, has reached safe and efficient Design object, use, can be applied in actual production life process suitable for large-scale promotion.
Brief description of the drawings
Fig. 1 is the mobile gunz sensing network schematic diagram of the present invention;
Fig. 2 is a kind of step flow chart of the method for secret protection of mobile intelligent perception of the present invention.
Embodiment
Below in conjunction with the accompanying drawings and embodiment the present invention will be further described.
Distributed geometry distribution is introduced in mobile gunz sensing network by the present invention plus perception of the mechanism to perception user of making an uproar Data add noise, and difference is perceived user and the perception data for adding noise is encrypted using homomorphic cryptography and uploads to modulation Device, modulator, which need not decrypt each ciphertext, can draw perception data polymerization result;By by auction mechanism and Secure meter The data trade mode being combined, effectively solve the pernicious transaction issues between service provider and modulator.
It is as shown in Figure 1 mobile gunz sensing network schematic diagram, including:
100th, user is perceived;110th, modulator;120th, service provider;130th, opponent;
User 100 is perceived, is to use mobile awareness equipment(Such as, intelligent terminal, wearable device, mobile unit etc.)Society Meeting domestic consumer, upload perception data and simultaneously maximize the corresponding income of acquisition, it is necessary to protect a large amount of sensitivities contained in perception data And privacy information.
Modulator 110, it is main to be responsible for interacting with perceiving user and service provider.
Service provider 120, mainly buy perception data polymerization result by modulator, for machine learning, data can Depending on the field such as changing, service is provided for the user of different demands, the service provider of rationality is wished with reasonable prices from modulator The data of better quality are obtained, to reduce purchase cost, service providers may be selected types of alliance and together buy data progress It is shared, while share price paid.
The opponent 130, represent to that may be launched a offensive in modulator, perception data upload procedure.
Fig. 2 is refer to, the present embodiment provides a kind of method for secret protection of mobile intelligent perception, including perception data uploads Stage, perception data polymerization stage and perception data transactional stage;
The perception data upload stage comprises the following steps:
(1)Mixed excitation perceives step
S11, the perception user pass through the embedded type sensor contained by the mobile device of its own(Such as acceleration sensor, number Word compass, GPS, microphone, shooting are first-class)Perception task is participated in, obtains corresponding perception data;
(2)Perception data adds step of making an uproar
S12, it is distributed using distributed geometry plus makes an uproar that the perception data for perceiving to obtain by step S11 add and made an uproar processing;In In the present embodiment, distributed geometry distribution plus one kind for being to meet difference privacy of making an uproar add the mode of making an uproar in the step S12, distributed It is a kind of Laplacian noise addition mechanism for being considered as discrete type that geometry, which is distributed plus made an uproar, can be at utmost using this mechanism Reduction because noise add and on caused by final perception data polymerization result error influence;
(3)User key generation step
S13, according to system key constraints, mobile gunz sensory perceptual system performs random key generating algorithm and obtains each participation The perception user encryption key and modulator decruption key of perception.
S14, the encryption key obtained by step S13 is sent to each perception use for participating in perception task by safe lane Family, the decruption key obtained by step S13 is sent to modulator by safe lane;Safe lane can be public network, specially With network, cable network, wireless network, but it is safe and reliable, such as SSL, IPSec VPN to require;
(4)Perception data encrypting step
S15, the encryption key for perceiving user's obtaining step S14, pair plus processing of making an uproar after perception data be encrypted to obtain Ciphertext is simultaneously uploaded to modulator by ciphertext;In the present embodiment, in the step S15 encryption use homomorphic cryptography side Formula, it is the cryptological technique of the computational complexity theory based on difficult math question, the data Jing Guo homomorphic cryptography handle To one output, this output is decrypted, its result with Same Way processing unencryption initial data obtain it is defeated It is the same to go out result.
Perception data polymerization stage comprises the following steps:
(5)Perception data polymerization procedure
S21, modulator obtain whole ciphertexts that the perception user of all participation perception tasks is uploaded by step S15;
The perception user that S22, modulator obtain the progress quadrature computing of gained whole ciphertext all participation perception tasks is uploaded The product of ciphertext;
(6)Perception data decryption step
S23, modulator upload close with decruption key to the perception user as all participation perception tasks obtained by step S22 The product of text is decrypted processing and obtains the polymerization result of perception data and be stored in modulator;In the present embodiment, the ciphertext Decryption processes be, by the ciphertext carry out it is tired multiply calculating after, can be not required to that each ciphertext is decrypted, that is, obtain institute There is plaintext sum.
Perception data transactional stage comprises the following steps:
(7)Multi-party computations step
Type by the perception data polymerization result obtained by step S23 is published to mobile gunz sensory perceptual system by S31, modulator In all service providers;
S32, service provider decide whether to participate in this data trade process according to the type of perception data polymerization result, if clothes Business provider determines participation data trade, then participates in the data trade auction process of next step;Otherwise, transaction is exited;
S33, modulator record participate in service provider's number of current data transaction auctionnAnd to participating in data trade auction Service provider from 1 tonIt is numbered;
S34, modulator will produce a random number by random sequence generator, and provide the default valency to current transaction data Lattice;
S35, modulator sum random number and default price, and result is transferred into the service that numbering is 1 by safe lane Provider;
The service provider couple that result of the service provider that S36, numbering are 1 obtained by by step S35 is 1 plus numbering The quotation of transaction data, and the service provider that numbering is 2 is sent result to, said process is repeated, until numbering isnClothes Business provider be by numberingn-1Service provider transmitted by result on plus numbering benService provider to transaction The quotation of data, and final result is back to modulator;
S37, modulator subtract final result the random number in step S34, and by acquired results divided by participate in current data friendship The service provider's number easily auctioned obtains auction and started auction price;Auction price of starting auction is published to participation current data by modulator Merchandise the service providers auctioned;In the present embodiment, the process that negotiation data auctions price of starting auction is a kind of typical peace The complete multi-party collaboration for calculating, solving the respective quotation privacy of protection between the service provider of one group of mutual mistrust in this step Computational problem, ensure the independence of input, the correctness of calculating, while do not reveal each input value to other clothes for participating in calculating Be engaged in provider.
(8)Perception data transaction auction step
S38, the service provider for participating in data trade auction adjust according to the price of starting auction of announcement and each offer and be sent to tune Device processed;
S39, modulator select the winning bidder that soprano auctions for data trade that offers in the quotation of each service provider;
S40, the winning bidder of data trade auction pay the corresponding amount of money according to oneself offering to modulator;
S41, modulator send the perception data polymerization result obtained by step S23 to data trade auction winning bidder, complete Transaction.
The system that the present embodiment also provides the data-privacy protection in a kind of mobile intelligent perception:Perceived including mixed excitation Module, perception data add module of making an uproar, user key generation module, perception data encrypting module, encryption data uploading module, perception Data aggregate module, perception data deciphering module, multi-party computations module and perception data transaction auction module;
Mixed excitation sensing module, for encouraging more perception users to participate in perception task for a long time and providing the perception of better quality Data;In the present embodiment, mixed excitation mechanism combines 3 kinds of energisation modes in the mixed excitation sensing module:Remuneration branch The mode of paying, the excitation of reputation integration and service quality excitation;
Perception data adds module of making an uproar, for adding noise to the perception data using the distribution of distributed geometry;Utilize distribution Geometry distribution can be reduced farthest because of noise addition and to the error shadow caused by final perception data polymerization result Ring.
User key generation module, user encryption key and modulator decryption are perceived for being generated according to key constraint condition Key;
Perception data encrypting module, for operation to be encrypted to the perception data;Using the encryption key to the sense Primary data is encrypted to obtain the ciphertext;
Encryption data uploading module, the ciphertext for perception data encrypting module to be obtained are uploaded to modulator;
Perception data aggregation module, ciphertext obtained by encryption data uploading module is polymerize for modulator;
Perception data deciphering module, for polymerization result obtained by perception data aggregation module to be decrypted;
Multi-party computations module, for participating in the service provider of data auction before ensureing that itself quotation privacy is not revealed Put, joint consultation goes out transaction data and started auction price;
Perception data transaction auction module, for selecting winning bidder according to the quotation of service provider, carries out data trade.
The foregoing is only presently preferred embodiments of the present invention, all equivalent changes done according to scope of the present invention patent with Modification, it should all belong to the covering scope of the present invention.

Claims (6)

  1. A kind of 1. method for secret protection of mobile intelligent perception, it is characterised in that including:
    Perception data is uploaded, perception data polymerization and perception data are merchandised;
    The perception data, which uploads, to be comprised the following steps:
    Step S11:Perceive user and perception task is participated in by the embedded type sensor of mobile device, obtain perception data;
    Step S12:It is distributed plus is made an uproar using distributed geometry and perception data is carried out to add processing of making an uproar;
    Step S13:According to key constraint condition, mobile gunz sensory perceptual system generation perceives the encryption key and modulator of user Decruption key;
    Step S14:Encryption key is sent to the perception user for participating in perception task by safe lane, decruption key is passed through Safe lane is sent to modulator;
    Step S15:Perceive user obtain encryption key, pair plus make an uproar processing after perception data be encrypted, obtain ciphertext And ciphertext is uploaded to modulator;
    The perception data polymerization comprises the following steps:
    Step S21:Modulator obtains whole ciphertexts that the perception user of all participation perception tasks is uploaded;
    Step S22:The progress quadrature computing of gained whole ciphertext is obtained the perception user institute of all participation perception tasks by modulator Upload the product of ciphertext;
    Step S23:Processing is decrypted to the obtained products of step S22 with decruption key and obtains the polymerization of perception data for modulator As a result and it is stored in modulator;
    The perception data transaction comprises the following steps:
    Step S31:Type by the polymerization result of the perception data obtained by step S23 is published to mobile gunz sense by modulator Know all service providers in system;
    Step S32:Service provider decides whether to participate in this data trade mistake according to the type of the polymerization result of perception data Journey, if service provider determines to participate in data trade, carry out step S33;Otherwise, transaction is exited;
    Step S33:Modulator record participates in service provider's number of current data transaction auctionnAnd clap participating in data trade The service provider sold from 1 tonIt is numbered;
    Step S34:Modulator produces a random number X by random sequence generator, and provides to the pre- of current transaction data If price P;
    Step S35:Modulator sums random number X and default price P, and result X+P is transferred into numbering by safe lane For 1 service provider;
    Step S36:The service provider that numbering is 1 sums obtained result X+P and oneself quotation P1 to transaction data, and Result X+P+P1 is sent to the service provider that numbering is 2, the like, until numbering isnService provider will be final As a result Y is back to modulator, Y=X+P+P1+...+Pn, and Pn is that numbering isnQuotation of the service provider to transaction data;
    Step S37:Modulator calculates price p=(the Y-X)/n that starts auction, and the price that will start auction is published to and participates in current data transaction bat The service provider sold;
    Step S38:Service provider each offers according to the price adjustment that starts auction and is sent to modulator;
    Step S39:Modulator selects the winning bidder that soprano auctions for data trade that offers in the quotation of service provider;
    Step S40:The winning bidder of data trade auction pays the corresponding amount of money according to the quotation of oneself to modulator;
    Step S41:Modulator sends the polymerization result of perception data to the winning bidder of data trade auction, completes transaction.
  2. A kind of 2. method for secret protection of mobile intelligent perception according to claim 1, it is characterised in that:The step Distributed geometry distribution, which adds to make an uproar, in S12 meets difference privacy, is a kind of Laplacian noise addition mechanism of discrete type, can reduce The error caused by the polymerization result of perception data is influenceed because noise adds.
  3. A kind of 3. method for secret protection of mobile intelligent perception according to claim 1, it is characterised in that:The step Encryption uses homomorphic cryptography mode in S15.
  4. A kind of 4. method for secret protection of mobile intelligent perception according to claim 1, it is characterised in that:The step Decryption processes are in S23:Ciphertext tire out and multiplies calculating, is not required to that each ciphertext is decrypted, that is, obtains all plaintexts Sum.
  5. 5. a kind of intimacy protection system of mobile intelligent perception, it is characterised in that including mixed excitation sensing module, perception data Add module of making an uproar, user key generation module, perception data encrypting module, encryption data uploading module, perception data aggregation module, Perception data deciphering module, multi-party computations module and perception data transaction auction module;
    The mixed excitation sensing module, for encouraging perception user persistently to participate in perception task and providing perception data;
    The perception data adds module of making an uproar, for adding noise to perception data using the distribution of distributed geometry;
    The user key generation module, user encryption key and modulator decryption are perceived for being generated according to key constraint condition Key;
    The perception data encrypting module, for perception data being encrypted operation;Using perception user encryption key to sense Primary data is encrypted to obtain ciphertext;
    The encryption data uploading module, the ciphertext for perception data encrypting module to be obtained are uploaded to modulator;
    The perception data aggregation module, ciphertext obtained by encryption data uploading module is polymerize for modulator;
    The perception data deciphering module, for polymerization result obtained by perception data aggregation module to be decrypted;
    The multi-party computations module, the service provider for participating in data auction do not reveal in guarantee itself quotation privacy On the premise of, joint consultation goes out transaction data and started auction price;
    The perception data transaction auction module, for selecting winning bidder according to the quotation of service provider, carries out data trade.
  6. A kind of 6. intimacy protection system of mobile intelligent perception according to claim 5, it is characterised in that:The user is close In key generation module, perceive user encryption key and modulator decruption key is meeting its key about by random key generating algorithm Randomly generated on the premise of beam condition, and complete a perception task, i.e., reconciliation is encrypted to the perception data at certain moment Failed after close operation.
CN201710814904.1A 2017-09-12 2017-09-12 Privacy protection method and system for mobile crowd sensing Active CN107707530B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710814904.1A CN107707530B (en) 2017-09-12 2017-09-12 Privacy protection method and system for mobile crowd sensing

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710814904.1A CN107707530B (en) 2017-09-12 2017-09-12 Privacy protection method and system for mobile crowd sensing

Publications (2)

Publication Number Publication Date
CN107707530A true CN107707530A (en) 2018-02-16
CN107707530B CN107707530B (en) 2020-07-31

Family

ID=61172539

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710814904.1A Active CN107707530B (en) 2017-09-12 2017-09-12 Privacy protection method and system for mobile crowd sensing

Country Status (1)

Country Link
CN (1) CN107707530B (en)

Cited By (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108494760A (en) * 2018-03-14 2018-09-04 安徽大学 A kind of intelligent perception true value discovery method of protection privacy
CN108600271A (en) * 2018-05-10 2018-09-28 重庆邮电大学 A kind of method for secret protection of trust state assessment
CN108769023A (en) * 2018-05-30 2018-11-06 苏州大学 A kind of method for secret protection and system applied to intelligent perception
CN109214205A (en) * 2018-08-01 2019-01-15 安徽师范大学 Position and data-privacy guard method in a kind of intelligent perception based on k- anonymity
CN109446844A (en) * 2018-11-15 2019-03-08 北京信息科技大学 A kind of method for secret protection and system towards big data publication
CN109548014A (en) * 2018-12-17 2019-03-29 杭州职业技术学院 A kind of low energy consumption secret protection polymerization based on mobile polymerization person
CN109862114A (en) * 2019-03-12 2019-06-07 南京邮电大学 A kind of safety vehicle intelligent perception method calculated based on mist
CN110087237A (en) * 2019-04-30 2019-08-02 苏州大学 Method for secret protection, device and associated component based on disturbance of data
CN110135847A (en) * 2019-05-22 2019-08-16 同济大学 The system and method for being used to improve electronic auction safety based on block chain
CN110166243A (en) * 2019-05-22 2019-08-23 安徽师范大学 Aggregated data method for secret protection based on elliptic curve in a kind of intelligent perception
CN110570284A (en) * 2019-09-11 2019-12-13 安徽大学 Heterogeneous virtual machine distribution method with differential privacy protection
CN110752924A (en) * 2019-10-30 2020-02-04 四川长虹电器股份有限公司 Key safety management method based on safety multi-party calculation
CN110825810A (en) * 2019-10-28 2020-02-21 天津理工大学 Block chain-based crowd sensing double privacy protection method
CN112423027A (en) * 2020-10-22 2021-02-26 武汉理工大学 Mobile streaming media edge collaboration distribution device and method based on differential privacy
CN113553614A (en) * 2021-06-29 2021-10-26 福建师范大学 Privacy protection mobile crowd-sourcing perception method based on reinforcement learning
CN115292743A (en) * 2022-07-06 2022-11-04 南京邮电大学 Big data application system based on intelligent group sensing technology

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100082983A1 (en) * 2008-09-30 2010-04-01 Shah Rahul C Secure device association
US20120316956A1 (en) * 2011-06-07 2012-12-13 Microsoft Corporation Client-Server Joint Personalization for Private Mobile Advertising
CN103763100A (en) * 2013-10-29 2014-04-30 清华大学 Sum and product computing method for protecting data privacy security of arbitrary user group
CN104657133A (en) * 2015-01-28 2015-05-27 南京邮电大学 Single time window task excitation method for mobile crowd-sourcing perception
CN104850935A (en) * 2015-04-15 2015-08-19 南京邮电大学 Mobile group intelligent perception excitation method with minimized payment as object
CN106850106A (en) * 2017-01-09 2017-06-13 重庆邮电大学 Radio environment map datum collection system and method based on mobile intelligent perception

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100082983A1 (en) * 2008-09-30 2010-04-01 Shah Rahul C Secure device association
US20120316956A1 (en) * 2011-06-07 2012-12-13 Microsoft Corporation Client-Server Joint Personalization for Private Mobile Advertising
CN103763100A (en) * 2013-10-29 2014-04-30 清华大学 Sum and product computing method for protecting data privacy security of arbitrary user group
CN104657133A (en) * 2015-01-28 2015-05-27 南京邮电大学 Single time window task excitation method for mobile crowd-sourcing perception
CN104850935A (en) * 2015-04-15 2015-08-19 南京邮电大学 Mobile group intelligent perception excitation method with minimized payment as object
CN106850106A (en) * 2017-01-09 2017-06-13 重庆邮电大学 Radio environment map datum collection system and method based on mobile intelligent perception

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
吴垚: ""群智感知激励机制研究综述"", 《软件学报》 *

Cited By (25)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108494760A (en) * 2018-03-14 2018-09-04 安徽大学 A kind of intelligent perception true value discovery method of protection privacy
CN108600271B (en) * 2018-05-10 2020-05-22 重庆邮电大学 Privacy protection method for trust state evaluation
CN108600271A (en) * 2018-05-10 2018-09-28 重庆邮电大学 A kind of method for secret protection of trust state assessment
CN108769023A (en) * 2018-05-30 2018-11-06 苏州大学 A kind of method for secret protection and system applied to intelligent perception
CN108769023B (en) * 2018-05-30 2021-04-23 苏州大学 Privacy protection method and system applied to crowd sensing
CN109214205A (en) * 2018-08-01 2019-01-15 安徽师范大学 Position and data-privacy guard method in a kind of intelligent perception based on k- anonymity
CN109446844A (en) * 2018-11-15 2019-03-08 北京信息科技大学 A kind of method for secret protection and system towards big data publication
CN109446844B (en) * 2018-11-15 2020-06-05 北京信息科技大学 Privacy protection method and system for big data release
CN109548014A (en) * 2018-12-17 2019-03-29 杭州职业技术学院 A kind of low energy consumption secret protection polymerization based on mobile polymerization person
CN109862114B (en) * 2019-03-12 2021-08-10 南京邮电大学 Safe vehicle crowd-sourcing sensing method based on fog calculation
CN109862114A (en) * 2019-03-12 2019-06-07 南京邮电大学 A kind of safety vehicle intelligent perception method calculated based on mist
CN110087237A (en) * 2019-04-30 2019-08-02 苏州大学 Method for secret protection, device and associated component based on disturbance of data
CN110166243A (en) * 2019-05-22 2019-08-23 安徽师范大学 Aggregated data method for secret protection based on elliptic curve in a kind of intelligent perception
CN110135847A (en) * 2019-05-22 2019-08-16 同济大学 The system and method for being used to improve electronic auction safety based on block chain
CN110166243B (en) * 2019-05-22 2022-04-19 安徽师范大学 Aggregation data privacy protection method based on elliptic curve in crowd sensing
CN110570284A (en) * 2019-09-11 2019-12-13 安徽大学 Heterogeneous virtual machine distribution method with differential privacy protection
CN110570284B (en) * 2019-09-11 2021-06-08 安徽大学 Heterogeneous virtual machine distribution method with differential privacy protection
CN110825810A (en) * 2019-10-28 2020-02-21 天津理工大学 Block chain-based crowd sensing double privacy protection method
CN110825810B (en) * 2019-10-28 2023-05-19 天津理工大学 Block chain-based crowd sensing dual privacy protection method
CN110752924A (en) * 2019-10-30 2020-02-04 四川长虹电器股份有限公司 Key safety management method based on safety multi-party calculation
CN112423027A (en) * 2020-10-22 2021-02-26 武汉理工大学 Mobile streaming media edge collaboration distribution device and method based on differential privacy
CN112423027B (en) * 2020-10-22 2021-10-22 武汉理工大学 Mobile streaming media edge collaboration distribution device and method based on differential privacy
CN113553614A (en) * 2021-06-29 2021-10-26 福建师范大学 Privacy protection mobile crowd-sourcing perception method based on reinforcement learning
CN113553614B (en) * 2021-06-29 2023-07-14 福建师范大学 Privacy protection mobile crowd intelligent sensing method based on reinforcement learning
CN115292743A (en) * 2022-07-06 2022-11-04 南京邮电大学 Big data application system based on intelligent group sensing technology

Also Published As

Publication number Publication date
CN107707530B (en) 2020-07-31

Similar Documents

Publication Publication Date Title
CN107707530A (en) A kind of method for secret protection and system of mobile intelligent perception
CN112906030B (en) Data sharing method and system based on multi-party homomorphic encryption
CN111095332A (en) Method and system for privacy-preserving social media advertising
CN110087237B (en) Privacy protection method and device based on data disturbance and related components
CN103457727B (en) A kind of methods, devices and systems for realizing media data processing
CN105307165B (en) Communication means, server-side and client based on mobile application
CN109495465A (en) Privacy set intersection method based on intelligent contract
CN113127916A (en) Data set processing method, data processing device and storage medium
CN102025507B (en) Digital copyright management method for protecting digital content consumer privacy
CN110730064B (en) Data fusion method based on privacy protection in crowd sensing network
CN109345331A (en) A kind of intelligent perception system task distribution method with secret protection
CN106789985A (en) Client validation method and system based on GPU algorithms
CN101908961B (en) Multi-party secret handshaking method in short key environment
CN112597542B (en) Aggregation method and device of target asset data, storage medium and electronic device
CN107483505A (en) The method and system that a kind of privacy of user in Video chat is protected
CN115037477A (en) Block chain-based federated learning privacy protection method
Khan et al. Blockchain-based distributive auction for relay-assisted secure communications
CN112581127A (en) Commodity transaction method and device, computer equipment, storage medium and system
CN114491578A (en) Security data aggregation method for privacy calculation
CN113657978A (en) Distributed energy auction method and system based on block chain and privacy protection
Cao et al. Strong anonymous mobile payment against curious third-party provider
Hong et al. An efficient and secure attribute-based online/offline signature scheme for mobile crowdsensing
Zhang et al. Designing secure and dependable mobile sensing mechanisms with revenue guarantees
Wang et al. A privacy protection scheme for electricity transactions in the microgrid day-ahead market based on consortium blockchain
CN108599923A (en) The implementation method of data efficient safe transmission between cloud computing server

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant